Analisis Dan Evaluasi Protokol Keamanan Jaringan Nirkabel Wi-Fi Protected Access 3 dengan Metode Penetration Testing

Dimas Erisma Faishol(1*), Triawan Adi Cahyanto(2), Miftahur Rahman(3),

(1) Universitas Muhammadiyah Jember, Indonesia
(2) Universitas Muhammadiyah Jember, Indonesia
(3) Universitas Muhammadiyah Jember, Indonesia
(*) Corresponding Author

Abstract


Information and communication technology is something that is integral to life in today's era. One of them is a wireless network. This research uses the Penetration Testing method to analyze the wireless technology security system that we often use every day. Analyzing wireless network security is carried out using the Penetration Testing method by carrying out attacks on a simulated network, the operating system used to carry out testing is Kali Linux. The results of this research show that network security using the WPA3 protocol is still vulnerable to gaps that can be exploited. This hacking test is only for educational purposes, it is not permitted to commit crimes such as stealing personal data of network users. By knowing this security gap, it will be an evaluation to provide better security

Full Text:

PDF

References


S. E. Prasetyo And R. C. Lee, “Analisis Keamanan Jaringan Pada Pay2home Menggunakan Metode Penetration Testing,” 2021. [Online]. Available: Https://Journal.Uib.Ac.Id/Index.Php/Combines

A. Kurniadi, “Analisis Keamanan Jaringan Wpa2-Psk Menggunakan Metode Penetration Testing (Studi Kasus : Tp-Link Archer A6),” 2021. [Online]. Available: Https://Journal.Uib.Ac.Id/Index.Php/Combines

M. A. Adiguna And B. W. Widagdo, “Analisis Keamanan Jaringan Wpa2-Psk Menggunakan Metode Penetration Testing (Studi Kasus : Router Tp-Link Mercusys Mw302r),” J. Siskom-Kb (Sistem Komput. Dan Kecerdasan Buatan), Vol. 5, No. 2, Pp. 1–8, 2022, Doi: 10.47970/Siskom-Kb.V5i2.268.

E. Lamers, “Securing Home Wi-Fi With Wpa3 Personal,” 2021.

B. Indira Reddy And V. Srikanth, “Review On Wireless Security Protocols (Wep, Wpa, Wpa2 & Wpa3),” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., Vol. 5, No. 4, Pp. 28–35, 2019, Doi: 10.32628/Cseit1953127.

R. Rachman Et Al., “Analisa Keamanan Jaringan Wireless Di Universitas Sam Ratulangi,” J. Media Inform. Budidarma, Vol. 1, No. 1, P. 178, 2021, Doi: 10.30865/Mib.V5i3.2979.

Y. Mulyanto, H. Herfandi, And R. Candra Kirana, “Analisis Keamanan Wireless Local Area Network (Wlan) Terhadap Serangan Brute Force Dengan Metode Penetration Testing (Studi Kasus:Rs H.Lmanambai Abdulkadir),” J. Inform. Teknol. Dan Sains, Vol. 4, No. 1, Pp. 26–35, 2022, Doi: 10.51401/Jinteks.V4i1.1528.

H. Haeruddin, “Analisa Dan Implementasi Sistem Keamanan Router Mikrotik Dari Serangan Winbox Exploitation, Brute-Force, Dos,” J. Media Inform. Budidarma, Vol. 5, No. 3, P. 848, 2021, Doi: 10.30865/Mib.V5i3.2979.

S. Sun And H. T. Canada, “A Chosen Random Value Attack On Wpa3 Sae Authentication,” Vol. 3, No. 2, 2022, Doi: 10.1145/3468526.

A. B. N. As-Sajid And R. E. Putra, “Analisis Dan Pengujian Dictionary Attack Terhadap Wpa3 Berbasis Script,” Vol. 05, Pp. 216–222, 2023.

E. Baray And N. Kumar Ojha, “Wlan Security Protocols And Wpa3 Security Approach Measurement Through Aircrack-Ng Technique,” Proc. - 5th Int. Conf. Comput. Methodol. Commun. Iccmc 2021, No. Iccmc, Pp. 23–30, 2021, Doi: 10.1109/Iccmc51019.2021.9418230.

A. A. Putra, “Analisis Dan Evaluasi Keamanan Wireless Lan Pada Pt. Bumi Jage Dalam,” Proceeding Semin. Nas. Ilmu Komput., Vol. 1, No. 1, Pp. 138–150, 2021, [Online]. Available: Https://Proceeding.Unived.Ac.Id/Index.Php/Snasikom/Article/View/59

A. Irfansyah, “Langkah-Langkah Penetration Testing Yang Perlu Kamu Ketahui,” Eduparx, 2023. Https://Eduparx.Id/Blog/Insight/Cyber-Security/Langkah-Langkah-Penetration-Testing-Yang-Perlu-Kamu-Tahu/ (Accessed Jan. 14, 2024).

A. Wi-Fi, C. P. Kohlios, And T. Hayajneh, “A Comprehensive Attack Flow Model And Security,” 2018, Doi: 10.3390/Electronics7110284.




DOI: http://dx.doi.org/10.30645/jurasik.v9i1.749

DOI (PDF): http://dx.doi.org/10.30645/jurasik.v9i1.749.g724

Refbacks

  • There are currently no refbacks.



JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan : View My Stats